Email address | john at autosectools.com |
---|---|
Website | www.autosectools.com |
First Active | 2010-04-27 |
Last Active | 2012-04-17 |
This Metasploit module exploits a vulnerability found on V-CMS's inline image upload feature. The problem is due to the inline_image_upload.php file not checking the file type before saving it on the web server. This allows any malicious user to upload a script (such as PHP) without authentication, and then execute it with a GET request. The issue is fixed in 1.1 by checking the extension name. By default, 1.1 only allows jpg, jpeg, png, gif, bmp, but it is still possible to upload a PHP file as one of those extension names, which may still be leveraged in an attack.
7dc5df6cc48f5dcc39d54d0e93805fdd
PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.
1e02ee78d2940ef98e05c77caf0939cd
PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.
4ddf92ab837e326d0d39b49b2c6d2aa6
PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.
392085a25f1f990b947853370d539873
A reflected cross site scripting vulnerability in V-CMS version 1.0 can be exploited to execute arbitrary JavaScript.
1b4bc6deefd42efc1d825c37fda25766
A SQL injection vulnerability in V-CMS version 1.0 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.
227ff1a112b2e271f868947e6f5843e5
An arbitrary upload vulnerability in V-CMS version 1.0 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.
16fbeae097458ceaf503548c01ac8d6f
A directory traversal vulnerability in Herberlin Bremsserver version 3.0 can be exploited to read files outside of the web root.
6239926a009b5342021fdfdc46486256
Whitepaper called Process Hollowing. Process hollowing is yet another tool in the kit of those who seek to hide the presence of a process. The idea is rather straight forward: a bootstrap application creates a seemingly innocent process in a suspended state. The legitimate image is then unmapped and replaced with the image that is to be hidden. If the preferred image base of the new image does not match that of the old image, the new image must be rebased. Once the new image is loaded in memory the EAX register of the suspended thread is set to the entry point. The process is then resumed and the entry point of the new image is executed.
991ac5d5f3a901007a494d89dc276de4
FuzzTalk is an XML driven fuzz testing framework that emphasizes easy extensibility and reusability. While most fuzzing frameworks require in depth programming knowledge, FuzzTalk can test a wide range of network protocols with the help of XML templates. Includes scripts for fuzzing HTTP, FTP, and SMTP servers.
0f7206509ccf1ffe3ceed654642a63b9
Whitepaper call Anti-Debugging with Exceptions. Several techniques for detecting exception swallowing debuggers have been documented. The concept is simple: by design, debuggers handle certain kinds of exceptions. If such an exception is wrapped in a try block, the exception handle is only executed if a debugger is not attached. Hence it can be inferred that a debugger is attached whenever the exception block is not executed.
6df664f50473c74a1b7c3dafb9eccf59
PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.
183aba9079d7a9459d25a61d503d2330
Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions. However, most methods rely on suspicious API functions and leave several easy to identify artifacts. This paper explores different ways IAT hooking can be employed while circumventing common detection mechanisms.
d0cefc671ad94febb6cd76561c7d9b76
167 bytes small all Windows null-free MessageBoxA shellcode. Tested on 2000, XP, XP x64, Vista, 7, 8 M3 x64.
dfa35acf94a6226ccd3a9e44c48db966
112 bytes small all Windows null-free CreateProcessA calc.exe shellcode.
ba9a69346aa022a746db247c8f3836f5
HTTP Bog is a slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses. Requires .NET 3.5. Written in C#.
c89d3304824a4967c6697363b15bd2f7
This is a directory traversal scanner written in C# that audits HTTP servers and web applications. Complete source included.
798bbe1106f4280b2e657657f6a283b3
A directory traversal vulnerability in Tele Data Contact Management Server can be exploited to read files outside of the web root.
12add4a93ba2b67aa6f0743c358c9c2b
A directory traversal vulnerability in Simple web-server version 1.2 can be exploited to read files outside of the web root.
0953890bc1299e7b8cb0e44e8992b42d
A reflected cross site scripting vulnerability in Nakid CMS version 1.0.2 can be exploited to execute arbitrary JavaScript.
a488a90b1a7f2a4cda5f688ba986e317
A local file inclusion vulnerability in Angora Guestbook version 1.5 can be exploited to include arbitrary files.
0ab487d5cc11e2b38345d81f9138c958
This is an HTTP console to remote administer Windows hosts with a browser-based, AJAX-enabled, command-line interface. Server requires .NET 3.5. Written in C# and JavaScript.
bca2d252dec2fdc40cb4c285d0c3b57a
A SQL injection vulnerability in Clipbucket version 2.4 RC2 645 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.
b1b0439bb9441c5ac22b49cc43e394f4
A local file inclusion vulnerability in eGroupware version 1.8.001.20110421 can be exploited to include arbitrary files.
3f5927d07efba7233255ced7e79056cd
An open redirect in eGroupware version 1.8.001.20110421 can be exploited to redirect users to an arbitrary URL.
c30f72c6bf551e389bc7d602e471dd19